shared responsibility model

Best Tips to Prevent DDOS attack on your cloud environment

A Distributed Denial of Service (DDoS) attack is a type of cyber-attack that aims to disrupt the normal functioning of a server or network by overwhelming it with a large amount of traffic from multiple sources. This type of attack can cause significant damage to cloud-based systems if they are not properly protected. Here are…

defend ransomware
| |

What is Ransomware? Defend against ransomware.

Ransomware is a kind of software which holds system/systems hostage for money (usually cryptocurrency like bitcoin). Once the ransom is paid, victim is provided with a “key” to unlock the affected systems. Ransomware holds the system by encrypting victim’s files. This can cause significant dent on business’s operation as the encrypted files are often critical….

azure sentinel kql
|

What is Azure Sentinel? Sentinel and KQL

Azure Sentinel is a cloud-native security information and event management (SIEM) system that helps organizations detect, investigate, and respond to threats in real-time. The platform provides a centralized view of security data from multiple sources including on-premises and cloud-based systems, which makes it easy to analyze data and get insights into potential security incidents. Additionally,…

email headers spf dkim dmarc
|

Email Headers: What is SPF, DKIM, DMARC?

You must have come across these terms while looking up for email security or trying to identify a phishing email. These are actually methods used to identify whether the email received is from a legitimate source or not. Let’s get started with SPF or Sender Policy Framework. It’s a record maintained with the sender organization’s…

Google XSS Game

So Google has this xss game where you can practice or test your xss vulnerability skills. You will have to make your own xss payloads as per the scenario of the task and get through the levels. I have just found out this website and I’ll try to do it and post my solutions with…

How to ping a Virtual Box machine from a VMware machine or vice versa

I see a lot of people face this problem. I, myself had this problem when I was trying some Vulnerable Labs which were based on Virtual box and I was running Kali machine on VMware. After some hit and trial, I figured this out. So to create a connection between these two platforms, we must…